Command Line Option Vulnerability in Python's Webbrowser API
CVE-2026-4519

7HIGH

What is CVE-2026-4519?

The webbrowser.open() API within Python has a vulnerability that allows URL inputs with leading dashes to be processed as command line options by certain web browsers. This issue can lead to unintended command execution. Although recent updates reject such inputs, it is recommended that users sanitize URLs thoroughly before passing them to the API to mitigate this risk. Developers should ensure that leading dashes are removed from URLs to maintain the integrity and security of their applications.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

CPython 0 < 3.15.0

References

CVSS V4

Score:
7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Seth Larson
Gregory P. Smith
.